With the emergence of recent technologies in the field of computer network, traditional infrastructure in the field of networks have become obsolete and incompatible with respect to the new architectures of open networks that emerge with force. This is how software-defined networks emerge by enabling cloud computing ecosystem, enterprise data centers, and telecommunications service providers. The major contribution of this paper is the simulation of an ecosystem based on a software defined network by making use of certain types of networks topologies and using the virtualization of the open network operating system (ONOS) and Mininet as a network emulator.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Internet of things protocols for resource constrained applications Pokala Sai
A detailed documentation on internet protocols at present happening of internet of things applications and a bit comparison of protocols using basic requirements
The basic function of the transport layer is to accept data from above it, split it up into smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end. Furthermore, all this must be done efficiently and in a way that isolates the upper layers from the inevitable changes in the hardware technology over the course of time.The transport layer also determines what type of service to provide to the session layer, and, ultimately, to the users of the network. The most popular type of transport connection is an error-free point-to-point channel that delivers messages or bytes in the order in which they were sent. However, other possible kinds of transport service exist, such as the transporting of isolated messages with no guarantee about the order of delivery, and the broadcasting of messages to multiple destinations. The type of service is determined when the connection is established. (As an aside, an error-free channel is completely impossible to achieve; what people really mean by this term is that the error rate is low enough to ignore in practice.)The transport layer is a true end-to-end layer; it carries data all the way from the source to the destination. In other words, a program on the source machine carries on a conversation with a similar program on the destination machine, using the message headers and control messages. In the lower layers, each protocols is between a machine and its immediate neighbors, and not between the ultimate source and destination machines, which may be separated by many routers. The difference between layers 1 through 3, which are chained, and layers 4 through 7, which are end-to-end,
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):- This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...Wheeler Flemming
Learn why SEL’s SDN technology promises to revolutionize Ethernet for industrial control system networks. The white paper was originally published in The Industrial Ethernet Book, Issue 98, February 2017.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
Implementation model architecture software defined network using raspberry Pi...TELKOMNIKA JOURNAL
Software defined network (SDN) made with basic concepts that are different from traditional networks in controlling the network, the separation between the control layer and forwarding layer on different devices allows the administrator to adjust the control plan for all devices centralized in one action, while in traditional network, the control and forwarding layers are located in the infrastructure making network administrator must manage devices one by one. Research using single board computers on network technology provides an opportunity to implement SDN architecture. Raspberry Pi has sufficient ability. QoS results meet the ITU-T G.1010 reference which indicates that Raspberry Pi can be used on designed networks.
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we have measured the Response Time and Throughput comparing with the Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler, and NOX.
In this paper we design the High-level Data Link Control to permit synchronous, code
transparent data transmission. The control information is always in the same position and specific bit
patterns which used for control differ dramatically from those representing data that reduces the errors
chances. The transmission rate and data stream are controlled by the network node. This eliminates
additional synchronization and buffering of the data at the network interface. Some common
applications include terminal-to-terminal, terminal to CPU, satellite communication, packet switching
and other high-speed data links. In system, which require expensive cabling, and interconnection
hardware. So this core can be used to simplify interfacing by going serially, thereby reducing
interconnects hardware cost. The HDLC Controller MEGACELL is a high performance module for the
bit oriented, switched, non-switched packet transmission module. It supports half duplex and full duplex
communication lines, point-to-point and multipoint channels.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Internet of things protocols for resource constrained applications Pokala Sai
A detailed documentation on internet protocols at present happening of internet of things applications and a bit comparison of protocols using basic requirements
The basic function of the transport layer is to accept data from above it, split it up into smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end. Furthermore, all this must be done efficiently and in a way that isolates the upper layers from the inevitable changes in the hardware technology over the course of time.The transport layer also determines what type of service to provide to the session layer, and, ultimately, to the users of the network. The most popular type of transport connection is an error-free point-to-point channel that delivers messages or bytes in the order in which they were sent. However, other possible kinds of transport service exist, such as the transporting of isolated messages with no guarantee about the order of delivery, and the broadcasting of messages to multiple destinations. The type of service is determined when the connection is established. (As an aside, an error-free channel is completely impossible to achieve; what people really mean by this term is that the error rate is low enough to ignore in practice.)The transport layer is a true end-to-end layer; it carries data all the way from the source to the destination. In other words, a program on the source machine carries on a conversation with a similar program on the destination machine, using the message headers and control messages. In the lower layers, each protocols is between a machine and its immediate neighbors, and not between the ultimate source and destination machines, which may be separated by many routers. The difference between layers 1 through 3, which are chained, and layers 4 through 7, which are end-to-end,
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):- This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...Wheeler Flemming
Learn why SEL’s SDN technology promises to revolutionize Ethernet for industrial control system networks. The white paper was originally published in The Industrial Ethernet Book, Issue 98, February 2017.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
Implementation model architecture software defined network using raspberry Pi...TELKOMNIKA JOURNAL
Software defined network (SDN) made with basic concepts that are different from traditional networks in controlling the network, the separation between the control layer and forwarding layer on different devices allows the administrator to adjust the control plan for all devices centralized in one action, while in traditional network, the control and forwarding layers are located in the infrastructure making network administrator must manage devices one by one. Research using single board computers on network technology provides an opportunity to implement SDN architecture. Raspberry Pi has sufficient ability. QoS results meet the ITU-T G.1010 reference which indicates that Raspberry Pi can be used on designed networks.
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we have measured the Response Time and Throughput comparing with the Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler, and NOX.
In this paper we design the High-level Data Link Control to permit synchronous, code
transparent data transmission. The control information is always in the same position and specific bit
patterns which used for control differ dramatically from those representing data that reduces the errors
chances. The transmission rate and data stream are controlled by the network node. This eliminates
additional synchronization and buffering of the data at the network interface. Some common
applications include terminal-to-terminal, terminal to CPU, satellite communication, packet switching
and other high-speed data links. In system, which require expensive cabling, and interconnection
hardware. So this core can be used to simplify interfacing by going serially, thereby reducing
interconnects hardware cost. The HDLC Controller MEGACELL is a high performance module for the
bit oriented, switched, non-switched packet transmission module. It supports half duplex and full duplex
communication lines, point-to-point and multipoint channels.
On the latency and jitter evaluation of software defined networksjournalBEEI
Conventional networking devices require that each is programmed with different rules to perform specific collective tasks. Next generation networks are required to be elastic, scalable and secured to connect millions of heterogeneous devices. Software defined networking (SDN) is an emerging network architecture that separates control from forwarding devices. This decoupling allows centralized network control to be done network-wide. This paper analyzes the latency and jitter of SDN against a conventional network. Through simulation, it is shown that SDN has an average three times lower jitter and latency per packet that translate to improved throughput under varying traffic conditions.
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...IJNSA Journal
The Internet and local networks (LAN) are essential in all organizations and aspects of our lives. These networks' performance should be at high speeds to perform efficiently. This thesis suggests several motions to improve performance. The first is a software-defined network (SDN) distinguished from traditional networks by its ability to program traffic, agility, and support for applications that need big data and virtualization. The second is to control congestion by rerouting traffic to the shortest path. Finally, to modify the above, device authentication reduces congestion and improves network performance.
Performance evaluation of software-defined networking controllers in wired an...TELKOMNIKA JOURNAL
Traditional networking solutions are unable to meet modern computing needs due to the expanding popularity of the internet, which requires increased agility and flexibility. To meet these objectives, software-defined networking (SDN) arises. A controller is a major element that will determine if SDN succeeds or fails. Various current SDN controllers in many sectors must be evaluated and compared. The performance of two well-known SDN controllers, POX and Ryu, is evaluated in this research. We used the Mininet-WiFi emulator to implement our work and the distributed internet traffic generator (D-ITG) to assess the aforementioned controllers using delay, jitter, packet loss, and throughput metrics. What is new in our research is the study of network performance in two different types of transmission media: wired and wireless. The speed of the wired medium was chosen to be fast ethernet, which was not previously studied. In addition, the size of the packet was varied among 128, 256, 512, and 1,024 bytes. The comparison was performed on three topologies (single, linear, and tree). The experimental results showed that Ryu offers significantly lower latency, jitter, and packet loss than POX in most scenarios. Also, the Ryu controller has higher throughput than POX, especially on wireless networks.
OpenFlow is one of the most commonly used protocols for communication between the
controller and the forwarding element in a software defined network (SDN). A model based on
M/M/1 queues is proposed in [1] to capture the communication between the forwarding element
and the controller. Albeit the model provides useful insight, it is accurate only for the case when
the probability of expecting a new flow is small.
Secondly, it is not straight forward to extend the model in [1] to more than one forwarding
element in the data plane. In this work we propose a model which addresses both these
challenges. The model is based on Jackson assumption but with corrections tailored to the
OpenFlow based SDN network. Performance analysis using the proposed model indicates that
the model is accurate even for the case when the probability of new flow is quite large. Further
we show by a toy example that the model can be extended to more than one node in the data plane.
Remote procedure calls (RPC) appear to be a useful paradigm for providing communication across a network between programs written in a high-level language. This paper describes a package providing a remote procedure call facility, the options that face the designer of such a package, and the decisions we made. We describe the overall structure of our RPC mechanism, our facilities for binding RPC clients, the transport level communication protocol, and some performance measurements. We include descriptions of some optimizations used to achieve high performance and to minimize the load on server machines that have many clients. Viewed by www.thanh.ch
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AND MININET
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
DOI: 10.5121/ijcsit.2018.10503 21
SIMULATION OF SOFTWARE DEFINED NETWORKS
WITH OPEN NETWORK OPERATING SYSTEM AND
MININET
Antonio Cortes
Department of Computer Engineering, University of Panama, Panama City, Panama
ABSTRACT
With the emergence of recent technologies in the field of computer network, traditional infrastructure in the
field of networks have become obsolete and incompatible with respect to the new architectures of open
networks that emerge with force. This is how software-defined networks emerge by enabling cloud
computing ecosystem, enterprise data centers, and telecommunications service providers. The major
contribution of this paper is the simulation of an ecosystem based on a software defined network by making
use of certain types of networks topologies and using the virtualization of the open network operating
system (ONOS) and Mininet as a network emulator.
KEYWORDS
Computer Network, Software-defined Networks, Network Topologies, Simulation, Open Network Operating
System.
1. INTRODUCTION
The infrastructure of the traditional networks was developed and implemented in such a way the
flow control and the routing oversaw the devices of the network, thus allowing static structure [3],
hierarchical and dependent on the network architecture. This makes the network a complex
scenario, because there is to accommodate the structure of the network to the needs of users,
taking into consideration the policies of a network [1] and the growth of these, since they are
problems those who face these designs.
Currently, with the emergence of social networks, smart devices and cloud computing, the
various network topologies that make up these infrastructures tend to become saturated and
consume a large bandwidth due to the electronic components of these innovative technologies. In
turn, the benefits of cloud computing and virtual storage are being limited by networks since the
implementation of new networks prevents them from meeting the new needs demanded by them
and demands from the operators’ market. In turn, the above gives rise to the emergence of a new
network model that improves the capabilities in these networks called Software Defined
Networks (SDN) [2].
In this way, Software Defined Networks are a network design architecture in which the control
layer and the data layer within a network are separated. It separates the hardware management
software from the network and transfers the control to other devices called controllers that
convert the data traffic and control the network into a centralized service [4]. At the same time,
the emergence of these networks is to cover a need related to the deficiencies of current networks
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
22
because, by reducing the hardware necessary for assembly, facilitates the reuse of hardware by
facilitating the management of network control elements and makes it simpler in its configuration
process and reduces management time for administrators, speeding up the deployment of
applications, services and infrastructures.
Therefore, SND networks allow to ensure that network engineers and administrators respond
quickly to changes in business by centralizing the control console, by improving the services on
the network by making them more dynamic, economical and scalable avoiding management at a
low level. Similarly, SDN networks are composed of three essential parts. On the one hand, we
have the controller that oversees managing the network and telling the rest of the devices how to
handle the traffic on the network. The Southbound APIs is a software like the OpenFlow protocol,
responsible for managing the communication between the controller and the devices. While the
Northbound APIs is responsible for establishing communication with applications and business
logic. In this way, for a network to be functional it is required that the devices of this have
incorporated a firmware with OpenFlow or another similar protocol. This means that SDN
network flexibly manage the devices through the controller, which is responsible for recognizing
the topology of the network, thus enabling better management of traffic loads in a flexible and
efficient manner, giving priority to processes, applications and services.
In this paper, we have considered the use of the Open Network Operating System (ONOS) and
the Mininet network emulator to be able to simulate the Software Defined Network (SDN)
ecosystem and their respective network topologies. It makes use of a graphical interface for the
virtual machine VirtualBox of Oracle, version 5.2.8 r121009 (Qt 5.6.2) in which ONOS is
installed with its respective Mininet emulator, the OpenFlow controller and the Ubuntu Operating
System 16.0.4.3.
The organization of this paper is as follows. In Section 2. Methods and Materials refers to the
inputs used in the preparation of this paper. In turn, Section 3. Results and Discussion, the
analysis of SDN is illustrated through ONOS and Mininet simulation tool. Section 4. Explains the
final considerations and details the references used in this paper.
2. METHODS AND MATERIALS
A systemic process is carried out that allows the ONOS, Mininet and revision of the
documentations from the various positions proposed by each one of the different authors.
2.1. OPEN NETWORK OPERATING SYSTEM (ONOS)
The Open Network Operating System is an open source distributed SDN control platform,
developed by the Open Networking Lab (ON, Lab) [5], and sponsored by some of the leading
companies and academic institutions. In comparison with Open-DayLight [6], the ONOS Project
is specifically oriented to ISP (Internet Service Provider) networks, facilitating high availability
and scalability, due to its distributed architecture. The identification of the network topologies, as
well as our results obtained in the SDN simulations, are carried out using the version of ONOS
1.13.1 and the Mininet network emulator.
On the other hand, to establish the design of the SDN network, as well as the number of
controllers or data switches, number of switches, identification of physical links through which
the exchanged packets travel between the control plane at the application level, not only the
ONOS platform was used, but two complementary approaches were also adapted. On the one
hand, we use the SDN Mininet network emulator [7], to create a test network topology, which is
shown in Figure 1., and we proceed to execute an instance of ONOS with fwd (Simple reactive
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
23
forwarding application), application responsible of generate traffic between the nodes of the
network through the Mininet network emulator. Through a network snnifer, we analyse the data
flow due to OF messages exchanged between each emulated switch and ONOS. It must be
considered that a port of a node can be connected to many nodes, for example, through switch /
hub.
Figure 1. Example of network that connects Hx and Hy through a route Pxy = 4 switches. Dashed lines indicate the
communication between the switches and the ONOS controller
In turn, to validate the interaction in the control plane and generalize our findings to any network,
we analyzed in detail the source code of ONOS, and the number of flow rules was evaluated
based on the number of flow packets received. Both reactive applications in ONOS work in layer
2 and assume a single IP address. The data flow is identified by a pair of source and destination
addresses, respectively, both at the MAC level and at the IP level. However, a data stream may
comprise multiple sessions at higher protocol levels, for example, TCP, UDP or RIP. Inside a
swith, we find a port connected to another swith and it is declared as an internal port, while a port
connected to a node, client and/or server, is identified as a host port. The network topology that
interconnects the switches, that is; the internal ports and the communication links between them
are previously known by the controller, thanks to the preliminary phase of topology discovery
based on the LLDP [8] protocol implemented by the controller sending specific pkt_out messages
to the switches. In turn, the location of the host, is given from the port where the host is
connected, is disconnected a priori so the controller must locate it in real time.
2.2. ONOS WORKFLOW
We consider that the flow configuration process establishes a bidirectional communication
between a source node (Hx) and a destination node (Hy), assuming that the ports of the
corresponding nodes are unknown to the controller (C1 or C2). Let Psd be the number of switches
along the shortest route from Hx to Hy. Let N be the total number of controllers in the network,
and let E be the number of communication links between the hubs or switches. We evaluate the
exact number of devices, cluster nodes, nodes, links, packet processor, partitions, ports (bits per
second), port statistics (packets per second) and data flow statistics (bytes), for the fwd
application. For simplicity, we refer to the tree topology shown in Figure 1. , as a reference case,
but our results generally apply to any given network topology. We assume that the ARP tables of
both Hx, Hy and the forwarding tables of all the switches are initially empty.
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
24
2.3. MININET
An emulator is software that allows programs to be run on a different platform than the one
originally designed. Unlike a simulator, it only reproduces the behavior of the program while an
emulator accurately models a device that can be compared with the original hardware.
MiniNet [9] is one of the first emulators explicitly developed to support SDN, by allowing the
efficient execution of small-scale networks with artificial traffic on computers that are not
necessarily powerful, its license is free and permissive (BSD - Berkeley Software Distribution).
In addition, implementing the network with a large number of network devices is very difficult
and expensive. Therefore, to overcome these problems, the virtual mode strategy has been carried
out in order to create prototypes and emulation of technological networks using the MiniNet
emulator. Its operation is carried out through a single Linux kernel and uses virtualization in order
to emulate a complete network using only a single system. However, the node created, as well as
the switches, routers and links are real elements although they are created by software [10].
The goal of MiniNet is to create virtual networks, running nodes, network cores and virtualized
network devices simply and quickly through a simple feature host, with an open and free
environment such as Linux. In turn, it has the ability to emulate different types of elements of the
network, such as: nodes, layer 2 switches, layer 3 routers and links.
Some features that led to the creation of MiniNet are:
• Flexibility, that is, new topologies and new features can be configured through the use of
software, by implementing common programming languages and operating systems.
• Applicability, allows correct applications made in prototypes. They should also be able to be
used in real networks based on hardware without any change in the source codes.
• Interactivity, responsible for managing and executing the simulation of the network, so it
must occur in real time as if it were happening with a real network.
• Scalability, prototyping must be scaled in large networks with hundreds or thousands of
switches on a single computer.
• Realistically, the behavior of the prototype must represent the real behavior of time with a
high degree of confidence, so the application and protocol stacks should be usable without
any code modification.
• Shareable, prototypes created should be easily shared with other collaborators, who can then
execute and modify the elements [11].
2.3.1 MININET WORKFLOW
Mininet has the capabilities that allow researchers or network programmers to create a new
software-defined network in a prototype and simple way, with the ability to interact, customize
and share, and provide a way to be executed on the hardware.
Creating a network.
You can create a network in MININET with a single command;
$ sudo mm --switch = ovsk, protocols = OpenFlow13 --controller = remote --topo = tree, depth =
4, fanout = 2 --ipbase = 172.17.0.2 / 20
Create a virtual network of four switches or switches connected in a tree topology to two hubs
and 20 nodes, each node configured for the corresponding switch, so there would be a distribution
of 5 nodes per switch, as show in Figure 2.
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
25
Figure 2. Network topology in Tree and its components
Interacting with a network
In Mininet, the entire virtual network can be controlled, and managed from a single console, for
example, the CLI command.
Mininet> h1 ping -c3 h2
It is used to send a ping to node h2 from node h1.
Mininet> nodes
View the list of available nodes.
Mininet> help
Allows you to see a list of available commands.
Dpctl: controls and edits flow tables.
Iperf: Test the TCP speed.
Customize a network.
Custom networks with a few lines of Python can be created with the Mininet API. For example, ~
/ mininet / custom / topo-4sw-20host.py
These few lines of Python create a virtual network of twenty nodes connected through virtual
links to four switches.
Share a network.
Mininet allows you to share the created, an image of VM to other researchers with the
purpose of running, evaluating or modifying it.
3. RESULTS AND DISCUSSION
Initially, the Open Network Operating System (ONOS) was activated, through the icon
named Setup ONOS Cluster. Subsequently, the network topology configuration called
Spine Leaf Topology or tree network topology is activated in such a way that activates all
the components of this topology. At the same time, the virtualization process of the
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
26
network is accessed through the ONOS GUI icon, which allows the researcher to observe
the behavior of the network with all its elements in real time.
Once we have activated the virtual ecosystem of the network, we proceed to identify the
existing devices in the network topology, as shown in Table 1.
Table 1. Devices.
Device Device Id Master Port H/W
Version
S/W
Version
Protocol
Spine-1 of:0000000000000001 172.17.0.3 5 Open
vSwitch
2.5.4 OF_13
Spine-2 of:0000000000000002 172.17.0.4 5 Open
vSwitch
2.5.4 OF_13
Leaf-1 of:000000000000000b 172.17.0.4 8 Open
vSwitch
2.5.4 OF_13
Leaf-2 of:000000000000000c 172.17.0.3 8 Open
vSwitch
2.5.4 OF_13
Leaf-3 of:000000000000000d 172.17.0.3 8 Open
vSwitch
2.5.4 OF_13
Leaf-4 of:000000000000000e 172.17.0.4 8 Open
vSwitch
2.5.4 OF_13
As shown in Table 1. , a total of 6 devices have been identified, of which Spine-1 and
Spine-2 refer to controllers C1 and C2, respectively. On the other hand, the Leaf - 1, Leaf
- 2, Leaf - 3 and Leaf - 4, are the switches that are part of the tree network topology.
Also, we can observe that each device has assigned a binary identifier of 16 digits, where
the last digit is a number and in another it is a letter. This is done in order to differentiate
the controllers of the switches in the network. Similarly, we have identified the hardware
version that is the Open vSwitch, the software version 2.5.4 and the communication
protocol that is OF_13. The master IP address 172.17.0.3, assigned to C1 allows
communication to be established with S2 and S3, respectively, while 172.17.0.4, which is
the IP address configured in C2, communicates S1 and S4.
In turn, we also identify the total of links that are 8 and that are part of the network, as
shown in Table 2.
Table 2. Link.
Port 1 Port 2 Type Direction
of:0000000000000002/1 of:000000000000000b/2 Direct
of:000000000000000b/1 of:0000000000000001/1 Direct
of:000000000000000c/1 of:0000000000000001/2 Direct
of:000000000000000c/2 of:0000000000000002/2 Direct
of:000000000000000d/1 of:0000000000000001/3 Direct
of:000000000000000d/2 of:0000000000000002/3 Direct
of:000000000000000e/1 of:0000000000000001/4 Direct
of:000000000000000e/2 of:0000000000000002/4 Direct
In Table 2. , we observe the respective ports 1 and 2, the type of link assigned to each
port, which is direct and the direction taken by the data flow in the network that is full-
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
27
duplex, represented by the equation A↔ B, which means that the data bits, zeros and
ones, travel simultaneously between two or more devices.
In Table 3. , we identify the total of nodes or host that are 20, with the following
parameters.
Table 3. Host.
Host Host Id Mac Address Location
10.0.0.1 00:00:00:00:00:01 / None 00:00:00:00:00:01 of:000000000000000b/3
10.0.0.2 00:00:00:00:00:02 / None 00:00:00:00:00:02 of:000000000000000b/4
10.0.0.3 00:00:00:00:00:03/ None 00:00:00:00:00:03 of:000000000000000b/5
10.0.0.4 00:00:00:00:00:04 / None 00:00:00:00:00:04 of:000000000000000b/6
10.0.0.5 00:00:00:00:00:05 / None 00:00:00:00:00:05 of:000000000000000b/7
10.0.0.6 00:00:00:00:00:06 / None 00:00:00:00:00:06 of:000000000000000c/3
10.0.0.7 00:00:00:00:00:07 / None 00:00:00:00:00:07 of:000000000000000c/4
10.0.0.8 00:00:00:00:00:08 / None 00:00:00:00:00:08 of:000000000000000c/5
10.0.0.9 00:00:00:00:00:09 / None 00:00:00:00:00:09 of:000000000000000c/6
10.0.0.10 00:00:00:00:00:0A / None 00:00:00:00:00:0A of:000000000000000c/7
10.0.0.11 00:00:00:00:00:0B / None 00:00:00:00:00:0B of:000000000000000d/3
10.0.0.12 00:00:00:00:00:0C / None 00:00:00:00:00:0C of:000000000000000d/4
10.0.0.13 00:00:00:00:00:0D / None 00:00:00:00:00:0D of:000000000000000d/5
10.0.0.14 00:00:00:00:00:0E / None 00:00:00:00:00:0E of:000000000000000d/6
10.0.0.15 00:00:00:00:00:0F / None 00:00:00:00:00:0F of:000000000000000d/7
10.0.0.16 00:00:00:00:00:10 / None 00:00:00:00:00:10 of:000000000000000e/3
10.0.0.17 00:00:00:00:00:11 / None 00:00:00:00:00:11 of:000000000000000e/4
10.0.0.18 00:00:00:00:00:12 / None 00:00:00:00:00:12 of:000000000000000e/5
10.0.0.19 00:00:00:00:00:13 / None 00:00:00:00:00:13 of:000000000000000e/6
10.0.0.20 00:00:00:00:00:14 / None 00:00:00:00:00:14 of:000000000000000e/7
In Table 3. , we observe the IP addresses assigned to each node, as well as the respective
identifier and mac address associated with each node. In the range of IP addresses
10.0.0.10 to 10.0.0.15, hexadecimal values are assigned to both the identifier and the mac
address of the respective nodes. In the location, each IP address of each node has the
respective switch assigned by a letter and the node number.
On the other hand, in table 4. , we obtain the processing of packets at different times of
activation of the topology of the network.
Table 4. Packets Processors.
Priority Packets Average (MS)
Priority
0
P1 P2 P3 P4 P5 A1 A2 A3 A4 A5
623 36 540 676 1576 6.47826 30.17557 4.45899 3.73259 2.00214
Priority
1
623 36 540 676 1576 4.42091 0.09236 4.54083 3.63926 1.57453
Priority
1
623 36 540 676 1576 1.31084 0.00300 1.08449 0.86684 0.37290
In Table 4. , we can see that packet processing will have three priority types, 0, 1 and 1,
respectively, established for this tree network topology. We did tests in the network with different
time intervals of connection and disconnection of the same, to observe the behavior at the level of
the processing of packages and the average of them. In addition, it was possible to observe the
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
28
bits per second at the ports level, the packets per second at the level of the statistics of the ports
and bytes at the level of the data flow statistics.
In Figure 3a.,and Figure 3b. , we can observe the relationship between the different
priorities with respect to the packages and the averages, respectively.
4. CONCLUSIONS
Figure 3a. Priority vs Packets Figure 3b. Priority vs. Average
In Figure 3a. , we can see that at the level of priority 1, in gray, the maximum number of
packets sent in the network reaches its maximum trajectory in 1576 packets, while the
lowest is in 36 packets. Between P3 and P4, the oscillation tends to increase with a
difference of 136 packets ((P4 = 676) - (P3 = 540) = 136). In the case of Figure 3b. , it is
observed that the maximum average is reached when A2 = 30.17557 milliseconds (ms) in
priority 0, in blue. The lowest average is given when A2 = 0.00300 milliseconds (ms) in
priority 1, in gray. The latter is due to a decrease in the bandwidth of the network or
otherwise a disconnection in some of its links due to a fault has occurred.
In the same way, other performance metrics were taken into account to evaluate the
performance of the network. These parameters are related to the bandwidth which is
analyzed through each of the ports located in the controllers and switches, respectively, as
we can see in Table 5.
Table 5. Ports for controllers and switches.
Device Enabled ID Speed Type
Spine-1
Spine-2
False Local 0 Copper
True 1 10000 Copper
True 2 10000 Copper
True 3 10000 Copper
True 4 10000 Copper
Leaf-1
Leaf-2
Leaf-3
Leaf-4
False Local 0 Copper
True 1 10000 Copper
True 2 10000 Copper
True 3 10000 Copper
True 4 10000 Copper
True 5 10000 Copper
True 6 10000 Copper
True 7 10000 Copper
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
29
In table 5. , we can see that both for the controllers, Spine-1 and Spine-2, and for the
switches, Leaf-1 to Leaf-4, the medium used for data transmission is copper and
bandwidth is 1 Mbits per second or 10,000 transmission bits in the infrastructure of the
links. It is also observed through the ID, which ports are active, in local status, true or
false, both for the controllers and for the switches.
In turn, another performance metric to evaluate is throughput, which is evaluated through
the ports per device of those packets that are sent and received, both at the switch and
controller level through the communications network.
In the case, of the switches, identified as Leaf-1 to Leaf-4, which you have assigned 8
port, 3 flows and 0 tunnel, you have for the switch, identified as: of: 000000000000000b,
the following information as observed in Table 6.
Table 6. Port for Device (Switches)
Port
ID
PKTS
Rx
PKTS
Tx
BYTE
S Rx
BYTES
Tx
PKTS Rx
DROPPED
PRTS Tx
DROPPED
DURATION
(SEC)
1 341 362 38416 40070 0 0 753
2 327 360 37156 40252 0 0 753
3 12 365 962 40564 0 0 753
4 12 377 962 41252 0 0 753
5 12 377 962 42344 0 0 753
6 14 377 1122 42910 0 0 753
7 12 377 962 42910 0 0 753
In Table 6, we can observe that the throughput is analyzed from the received and sent
packets in a network through a communication channel. The number of packets sent is
greater than that of the received ones. Similarly, bytes sent with respect to received bytes
happen. No packets sent and transmitted dropped. All this has an estimated 753 seconds.
On the other hand, for the controllers, Spine - 1 and Spine - 2 have 5 ports of which 4 are
used, since one is local. It also has 3 flows and 0 tunnel. In Table 7, we can observe,
specifically in the Spine - 2, the sent and transmitted packets.
Table 7. Port for Device (Controllers)
Port
ID
PKTS
Rx
PKTS
Tx
BYTES
Rx
BYTES
Tx
PKTS Rx
DROPPED
PRTS Tx
DROPPED
DURATION
(SEC)
1 693 709 66113 70383 0 0 1218
2 711 705 69129 70575 0 0 1218
3 711 711 69675 70935 0 0 1218
4 705 709 69119 71115 0 0 1218
As with the switches, we can see that the transmitted packets are larger than the received
packets. In turn, the bytes transmitted are greater than the bytes received. There are no
dropped shipping and receiving packages. All this has an estimated 1218 seconds.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
30
However, and with all the above, the network topology proposed in this work is
compared with the tree topology with the MPLS topology (Multiprotocol label
switching), since it is a very popular method used for traffic control and the creation of
virtual private networks (VPNs). This method known as "tunnel-less", is a bit
complicated to understand because it lacks a point-to-point connection. In Figure 4, the
MPLS topology is shown.
Figure 4. MPLS Topology
This scenario, which is presented in Figure 4, allows us to observe that at the level of
communications infrastructure, what dominates the most are switches interconnected
with fiber optic links or, ultimately, copper. It is important to mention that in this type of
topology there is a drop in logical links due to the creation of virtual private networks.
The existence of subnets composed of nodes is not unlike the tree topology that does
exist. In this type of scenario, clients connect to the backbone of the network through
multiservice links, which provides high transport speed and connectivity.
In addition, it is important to highlight the data packet flow that occurs in this type of
topology with respect to the tree topology, as shown in Figure 5a-b.
Figure 5a. Flow packets in Tree Topology Figure 5b. Flow packets in MPLS Topology
It is observed, in Figure 5a. and 5b. , respectively, in green, the flow of data packets is
more intense in the MPLS topology than in the Tree topology. Other reasons, which may
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
31
lead to the fall of the logical links in the MPLS topology is the means by which the data
is routed since it is copper.
4. CONCLUSIONS
In this article it is proved that the Open Network Operating System (ONOS) and the
Mininet network emulator allow researchers in the field of networks to virtualize a
network topology in tree and any other, with all its main actors as are: the switches, the
controllers, the nodes connected to each switch, establish the IP address for the network
in general and the IP addresses for each subnet, among other relevant aspects. Similarly,
it could be observed in the tree network topology, when the links between different nodes
break or fall or between the controller and a node. This situation is represented in the
virtual network, as discontinuous lines in red. It was observed how the bits per second are
transmitted between the various ports of each device. This process of data transmission
was reflected in the network in green.
On the other hand, a comparison process is carried out at the level of new network
performance metrics between which the bandwidth and throughput are considered. Both
metrics are analyzed taking into account the ports enabled in each switch and controller,
packets received and transmitted at the level of these devices. Also, a comparison is made
at the level of the proposed network topology against the MPLS topology, among which
the most outstanding is the flow of data packets between both topologies and that the
MPLS topology does not have sub-networks formed by nodes but interconnections
between different linked switches by means of a communication channel formed by
copper or optical fiber.
It is important to point out that where the experiments were carried out, the Hardware and
the Software used were installed in a desktop-like technological infrastructure. We used a
Lenovo Laptop with a 64-bit Operating System (Windows 10), an Intel Celeron 3205 U
processor with a speed of 1.50 GHz and 4.00 GB RAM. In the same way, it was installed
and made use of a virtual machine, Oracle VirtualBox, where ONOS and Mininet were
installed, thus optimizing the infrastructure and improving the performance of those
elements that were available at that time.
As future lines of research, ONOS would be used with other types of network emulators
to analyze the behavior of different topologies of more extensive networks and to start
with a comparison process, thus allowing us to observe and compare new results in this
type of ecosystem.
REFERENCES
[1] Carvalho, L. Fernando, Abrão. T, Mendes L. de Souza, ProençaJr. L. Mario, An Ecosystem for
Anomaly Detection and Mitigation in Software-defined Networking, Expert Systems with
Applications (2018), doi: 10.1016/j.eswa.2018.03.027
[2] F. Keti and S. Askar, "Emulation of Software Defined Networks Using Mininet in Different
Simulation Environments," 2015 6th International Conference on Intelligent Systems, Modelling and
Simulation, Kuala Lumpur, 2015, pp. 205-210, doi: 10.1109/ISMS.2015.46
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2018
32
[3] Hartpence. B and Rosario. R, Software Defined Networking for Systems and Network Administration
Programs, The USENIX Journal of Education in System Administration, November 2016, Volume
2, Number 1, https://www.usenix.org/jesa/0201/hartpence.
[4] Schaller. S and Hood. D, Software Defined Networking Architecture Standardization, Computer
Standards & Interfaces, (2016), doi:10.1016/j.csi.2017.01.005
[5] ONOS Controller, URL https://www.onosproject.org.
[6] A.R. Curtis, J.C. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, S.Banergee, Devoflow: scaling
flow management for high-performance networks, SIGCOMM Comput. Commun. Rev.41 (4)
(2011) 254-265
[7] Mininet Network Emulator, (Available at http://www.mininet.org).
[8] LLDP Link Layer Discovery Protocol, (IEEE Standard 802.1 AB).
[9] J. Metzler y S. Taylor, «Network World, » 08 06 2011. [En línea]. Available
http://www.networkworld.com/article/2177684/lan-wan/the-growth-in-eastwest-traffic.html.
[10] Mininet. An Instant Virtual Network on your Laptop.2014, Accessed: Sept. 2014[Online] Available:
http://mininet.org.
[11] B. Lantz, B. Heller, and N. McKeown, “A network in a laptop: rapid prototyping for software-defined
networks,” in Proceedings of the 9thACM SIGCOMM Workshop on Hot Topics in Networks. ACM,
2010.
Authors
Antonio Cortes Castillo is a computer engineer trained in the Latin American University of
Science and Technology (ULACIT), Costa Rica, 1995. He obtained his bachelor´s degree in
computer engineering with an emphasis in Management Information System at the
Nacional University of Heredia, Costa Rica, 2002. Adquiere his Master´s degree in
Computer Science (Telematics) at the Technological Institute of Costa Rica. He is now
teaching at the University of Panama and is with his PhD at the University of Alicante.